Skip to main content

Keyloggers and How to Defend Yourself

This article will discuss the negative impact of keyloggers. While there are many positive uses of this software, I will focus on the negative side, since I am a security consultant.
Keyloggers are simple programs that record keystrokes made on a keyboard. They have legitimate uses, such as parental controls and employee monitoring. But they can also be used for malicious activities, like recording keystrokes from someone logging into their bank account. This particular form of hacking is becoming widespread, and is now considered to be the number one way information is stolen. Keyloggers can be installed virtually undetected. Many perpetrators are using them in ads, so that when a person clicks on the ad, the software installs itself. Another popular way to install a key logger is through email. The email can be worded so enticing that the receiver will open the attachment, thus installing the software unnoticed.
How can a person protect themselves from this software being used for malicious purposes? Education and reinforcement of safety measures can help reduce key logger crimes. Most anti-virus software now comes with signatures for known keyloggers, so scanning the email before opening it is very important. Companies can educate their employees by reinforcing the need to be careful when using email, and to run a virus check on any attachments before opening. The following list provides some safety measures anyone can use to protect themselves:
  • Do not click OK on pop-up windows without first reading them thoroughly
  • Never open spam e-mail
  • You should pay for software instead of opting for the free, advertising supported version; never click on links in e-mail you receive from an unknown source
  • Type the URL into your Web browser
  • Do not open e-mail attachments from an unknown source
  • Use a firewall to help prevent any unauthorized computer activity
  • Run a weekly, full system anti-virus computer scan
If you are not sure whether a key logger is installed on your machine, you can use the virtual keyboard that comes with the Windows system. A virtual keyboard is a program that shows a keyboard on the screen, and the keys can be pressed by using a mouse. This can help keep the keystrokes from being noticed by the software. It is not a guarantee, but can be helpful. Another method that can help secure your account would be to use a one-time password. Using a one-time password can help minimize losses if the password is intercepted because the password generated can be used only one time. The period of time a password can be used is limited, so even if a one-time password is intercepted, the thief will not be able to use it to gain access.

Popular posts from this blog

Hide Files or Folders Using Command Prompt

Hide Files or Folders Using Command Prompt This is my second instructable. This one is totally different from my previous post...
In this esteemed instructable i'll be guiding you to hide a folder by using cmd.. Even the folder option method won't be able to track the hidden folder

You'll need
1. Windows based operating system
Step 1: Run Command Prompt and Basic Text Commands There are several methods to run cmd.. Some of them are listed below

1. Start -> Run -> Cmd
2. Starrt -> Program Files -> Accessories - > Command Prompt

Command Prompt is a newer version of Dos and other os similar to that.. In order to fulfill your needs to hide a folder you must atleast know some basic commands ...

Cd - navigates through a folder
Md - creates a folder
Dir - Directory list
Attrib - provides with various attrib features
Step 2: Hide d targeted folder Alright, it's time to hide the folder

Presuming that I have a folder named Secret in F:\ Drive
Here are the steps to do

First of all n…


An increasing number of IT professionals have been finding it difficult to handle emotional stress, according to experts. An ‘occupational hazard,' the stress related to work needs to be addressed without delay, they emphasise.

“Coping with stress and striving for mental health welfare should be a matter of concern for all and not treated simply as a lifestyle problem of the ‘IT phenomenon',” says Nithya Chandrasekaran, a consultant physician for many IT companies in the city. Post-recession, employees feel pressured to perform well.

Regular occupational problems such as wrist problems due to constant handling of the mouse, slip disc and eye fatigue are common now, but handling stress that arises owing to fear of losing job or to cope with the increasing competition, affects the employee's performance, eventually, taking a major toll on his health, doctors explain.

The project that K. Balajee (29) was handling was pulled off after six months of its inception. Currently ma…

Computer Server

Server A server is a computer that provides data to other computers. It may serve data to systems on a local area network (LAN) or a wide area network (WAN) over the Internet.

Many types of servers exist, including web servers, mail servers, and file servers. Each type runs software specific to the purpose of the server. For example, a Web server may run Apache HTTP Server or Microsoft IIS, which both provide access to websites over the Internet. A mail server may run a program like Exim or iMail, which provides SMTP services for sending and receiving email. A file server might use Samba or the operating system's built-in file sharing services to share files over a network.

While server software is specific to the type of server, the hardware is not as important. In fact, a regular desktop computers can be turned into a server by adding the appropriate software. For example, a computer connected to a home network can be designated as a file server, print server, or …